A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
A Comprehensive Dataset of Spelling Errors and Users’ Corrections in Croatian Language
Securing IoT Services Based on Security Requirement Categories
SCADA Systems With Focus on Continuous Manufacturing and Steel Industry: A Survey on Architectures, Standards, Challenges and Industry 5.0
Surgical DDoS Filtering With Fast LPM
Ranking Network Devices for Alarm Prioritisation: Intrusion Detection Case Study
Anomaly Correction in Time Series Data for Improved Forecasting
Comparison of Cuckoo Hash Table and Bloom Filter for Fast Packet Filtering Using Data Plane Development Kit
Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUs
Security research and learning environment based on scalable network emulation
Adaptable secure communication for the Cloud of Things
Lightweight and adaptable solution for security agility
Smart Detection and Classification of Application-Layer Intrusions in Web Directories
A network testbed for commercial telecommunications product testing
Quality of service mechanisms and priority management in HSPA system
Implementing Certificate-based Authentication Protocol on Smart Cards
DXR : towards a billion routing lookups per second in software
NgP - Protokol za dogovor parametara
Security Agility Solution Independent of the Underlaying Protocol Architecture
Improving distributed traffic generation performance by using IMUNES network emulator
Scalable software architecture for distributed MMORPG traffic generation based on integration of UrBBaN-Gen and IMUNES
Deploying New Hash Algorithms in Secure Neighbor Discovery
60th anniversary of the Department of telecommunications
Diagnosis and solving IP based audio signal transmission problems
SEND-based Source Address Validation for IPv6
Security in Private Communication Networks
Clustering Network Simulation: Graph Partitioning Approach
Operating System Support for Integrated Network Emulation in IMUNES
Real-Time IP Network Simulation at Gigabit Data Rates
Clonable network stack - concepts and potential applications
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 1 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003 Volume 2 of 2
Proceedings of the 7th International Conference on Telecommunications - ConTEL2003
An approach to education oriented TCP simulation
Estimating the Impact of Interrupt Coalescing Delays on Steady State TCP Throughput
Telephone Traffic Routing Simulation Using Learning Automata
Automatic Translation From SDL Specification To Distributed Erlang Implementation
WWW.HR - Experiences with Web-server development and maintenance
Automatic Erlang Code Generation from SDL Specification
From the SDL Specification Toward the Erlang Implementation
Specification of Erlang Applications
Laboratory for Telecommunications Software Technologies at the Faculty of Electrical Engineering and Computing at Zagreb
Object Orientation in SDL
Methods for checking specification correctness of telecommunication processes
SDL graphical editor
Programming Languages - models, techniques and applications
Implementation of a distributed hypermedia information system based on the WWW concept
Model of a Workstation for application of learning automata into object oriented simulation of adaptive routing methods
First experiences with the World-Wide Web in Croatia
Experimental Model of Operation and Maintenance Workstation: Expert System Module for Alarm Analysis
PBX-LAN Based Local Communication System
Experimental Expert Tools for Diagnostic in Telecommunication System and Network Management
A Functional Model of Call/Service Handling Algorithms
Teaching
University undergraduate
- Computer Security (Lecturer in charge)
- Computer Security (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Digital Logic (Lecturer in charge)
- Network Programming (Lecturer in charge)
- Network Programming (Lecturer in charge)
- BSc Thesis (Lectures)
- BSc Thesis (Lectures)
- BSc Thesis (Lectures)
- Final BSc Thesis (Lectures)
- Project C (Lectures)
- Project C (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
University graduate
- Communication Security (Lecturer in charge)
- Network and Service Management (Lecturer in charge)
- SCADA Systems (Lecturer in charge)
- Security Threats on the Internet (Lecturer in charge)
- Graduation Thesis (Lectures)
- Graduation Thesis (Lectures)
- Graduation Thesis (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Seminar 1 (Lectures)
- Seminar 2 (Lectures)
Postgraduate doctoral study programme
- Communication Protocols-Selected Topics (Lecturer in charge)
- Formalisms in Telecommunications (Lecturer in charge)
Postgraduate spec. study
- Security of computer networks (Lecturer in charge)
Competences
-
Circuits and systems
Logic circuits Programmable circuits Logic devices -
Computers and information processing
Computer networks Internet security IP networks Network security Computer security Denial-of-service attack Firewalls (computing) Honey pot (computing) Internet security Mobile security Penetration testing Software engineering Formal verification -
Communications technology
Communication networks Communication system security Computer networks Network security Internet security IP networks Mobile security Protocols Telecommunications